On Monday, March 15, 1999 3:23 AM, Glynn Clements [SMTP:[EMAIL PROTECTED]]
wrote:
>
> Adam Neat wrote:
>
> > does anyone know of a way to easily trace syn flooding, dos, smurf and
> > other types of traiffc on a network?
>
> What do you mean by `trace'? If you want to find where it came from,
> the answer is that you can't. Attacks which don't require the sender
> to receive any data can (and therefore do) use a spoofed source
> address.
>
> ICMP-flooding attacks can be logged with icmplogd. There may be
> something similar for SYN-flooding, but I don't know offhand.
>
> --
> Glynn Clements <[EMAIL PROTECTED]>
hello glynn,
well - it may be part of my personal naivity on Smurfing.
Basically a client of ours who is using Linux (we do to for ethernet
routers) we believe is getting smurfing or the blunt end of a DOS attack of
some type.
We want to try and work out how to
a) find out if this is the case
and
b) if its there, how do stop it.
does this help?
regards
adam
------------------------------------------------
IPAX Systems
Melbourne, Australia
National Systems Manager
Ops Tel: 1800 894 894
Ops Fax: 03 - 9801-8533
Web Site http://www.ipax.com.au
------------------------------------------------
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]